High-Speed Chase on the Information Superhighway: the Evolution of Criminal Liability for Internet Piracy

Total Page:16

File Type:pdf, Size:1020Kb

High-Speed Chase on the Information Superhighway: the Evolution of Criminal Liability for Internet Piracy Loyola of Los Angeles Law Review Volume 33 Number 1 Article 6 11-1-1999 High-Speed Chase on the Information Superhighway: The Evolution of Criminal Liability for Internet Piracy Shahram A. Shayesteh Follow this and additional works at: https://digitalcommons.lmu.edu/llr Part of the Law Commons Recommended Citation Shahram A. Shayesteh, High-Speed Chase on the Information Superhighway: The Evolution of Criminal Liability for Internet Piracy, 33 Loy. L.A. L. Rev. 183 (1999). Available at: https://digitalcommons.lmu.edu/llr/vol33/iss1/6 This Notes and Comments is brought to you for free and open access by the Law Reviews at Digital Commons @ Loyola Marymount University and Loyola Law School. It has been accepted for inclusion in Loyola of Los Angeles Law Review by an authorized administrator of Digital Commons@Loyola Marymount University and Loyola Law School. For more information, please contact [email protected]. HIGH-SPEED CHASE ON THE INFORMATION SUPERHIGHWAY: THE EVOLUTION OF CRIMINAL LIABILITY FOR INTERNET PIRACY I. INTRODUCTION The Internet is known by many names: the Information Super- highway, the World Wide Web,' the National Information Infra- structure,2 or simply "the Net." However confusing this terminology may be, most people in modem countries today are very much aware of the Internet and its growing popularity. The Computer Industry Almanac estimates that by the end of 1998, approximately 150 mil- lion people worldwide were "surfing" the Internet, up from nearly 40 million in 1995. 3 Nowadays, the number of Internet users is growing exponentially, expected to reach an estimated 320 million by 2001 and 720 million by 2006.4 1. Although the World Wide Web is actually only a component of the Internet, it is commonly perceived to be synonymous with the Internet itself. See ACLU v. Reno, 929 F. Supp. 824, 836 (E.D. Pa. 1996), aff'd, Reno v. ACLU, 521 U.S. 844 (1997). 2. The National Information Infrastructure is actually a broader concept that "encompasses digital, interactive services now available, such as the Inter- net, as well as those contemplated for the future." BRUCE A. LEHMAN & RONALD H. BROWN, U.S. DEP'T OF COMMERCE, INTELLECTUAL PROPERTY AND THE NATIONAL INFORMATION INFRASTRUCTURE: THE REPORT OF THE WORKING GROUP ON INTELLECTUAL PROPERTY RIGHTS 2 n.5 (1995), avail- able in U.S. Patent and Trademark Office (visited Sept 14, 1999) <http://www.uspto.gov/web/offices/comldoc/ipnii/index.html> [hereinafter Nil WHITE PAPER]. 3. See North America Is the Leading Region for Internet Users According to the Computer Industry Almanac, PR NEwswiRE, Aug. 17, 1999, available in LEXIS, News Library, PR Newswire File. 4. See id. ("North America will remain the leading region for Internet us- ers until at least 2005. It will grow from about 83 million Internet users at year-end 1998 to nearly 230 million by year-end 2005. West Europe is grow- ing faster than North America and will be a close second by 2005 with over 184 LOYOLA OFLOSANGELESLAWREVIE W [Vol. 33:183 Such massive growth inevitably breeds some unwanted weeds in the garden. The Internet's sheer size and anonymous nature allow countless Internet users to illegally pirate computer software and distribute it on the Internet without fear of apprehension.' Due to the ease with which software can be copied and distributed worldwide- virtually instantaneously--copyright owners have become reluctant to make their protected works readily available on the Internet with- out reasonable assurances against massive piracy.6 For the software industry alone, rampant copyright infringement now accounts for billions of dollars in worldwide losses each year.7 Naturally, soft- ware companies and other copyright-based industries have urged the federal government for years to strengthen copyright protections in order to address the problem.' In 1993, President Clinton formed the Information Infrastructure Task Force for the purpose of articulating and implementing the Administration's policy regarding the Internet, which it has termed the National Information Infrastructure ("Nl").9 This policy was first articulated in a report by the Working Group on Intellectual 10 Property Rights in 1995, commonly known as the "White Paper."' 202 million Internet users. The Asia-Pacific region is growing even faster and will have over 170 million Internet users in 2005."). 5. See Miro Kazakoff, The Ethics of Piracy Internet: The High Seas for Illegal Downloading, HARTFORD COURANT, Aug. 28, 1997, at El; see also Teddy C. Kim, Note, Taming the Electronic Frontier: Software Copyright Protection in the Wake ofUnited States v. LaMacchia, 80 MINN. L. REV. 1255, 1266 (1996) ("Because of the Internet's global breadth, and the ease with which it is navigated, a perpetrator can be very remote from the actual 'crime scene."'). 6. See S. REP. No. 105-190, at 8 (1998). 7. See John G. Spooner, Wizards to Thwart Pirates: Microsoft Registra- tion Wizardfor Office 2000 Premium Edition, PC WEEK, Dec. 14, 1998, avail- able in 1998 WL 25003887 (noting that worldwide losses from piracy in 1995, 1996, and 1997 cost the software industry $13.3 billion, $11.2 billion, and $11.4 billion respectively). 8. See 141 CoNG. REc. S14,550 (daily ed. Sept. 28, 1995) (statement of Sen. Hatch) (discussing the need to enact "rules of the road" to protect copy- righted works traveling on the Information Superhighway). See generally NII WHITE PAPER, supra note 2 (suggesting clarification and amendment of the Copyright Act of 1976 to ensure that the NII reaches its full potential). 9. See NII WHITE PAPER, supra note 2, at 1. 10. See generally NII WHITE PAPER, supra note 2 (report prepared by the Clinton administration to address intellectual property rights in light of new November 1999] IGH-SPEED CHASE The Working Group, headed by Secretary of Commerce Ronald Brown and Commissioner of Patents and Trademarks Bruce Leh- man, argued that, while copyright protection for creative works on the NII was necessary for the NI to develop to its full potential, relatively few amendments to existing copyright law were required." Accordingly, the Working Group's White Paper proposed a few se- lect amendments to the Copyright Act of 1976 ("Copyright Act")'2 in 13 order to "take proper account of the current technology.', Based upon the Working Group's proposals, both houses of Congress proposed several pieces of legislation, which eventually culminated in the passage of two acts in 1998: the No Electronic Theft Act ("NET Act")14 and the Digital Millennium Copyright Act ("DMCA"). 5 These acts were eagerly supported and acclaimed by copyright-based industries, such as software companies, movie stu- dios, record companies, and book publishers. However, in its "high- speed" attempt to curtail the problem of Internet piracy, Congress appears to have given more consideration to the interests of these powerful industry groups than to those of the general public, for whom the benefits of copyright law were originally intended.16 This Comment will examine the current state of criminal liabil- ity for software piracy on the Internet in light of the newly enacted No Electronic Theft Act and Digital Millennium Copyright Act. Part II is a short survey of the Internet, outlining its origins and its various forms of communication. Part HI discusses how federal copyright law, including the NET Act, addresses criminal copyright infringe- ment on the Internet and who is affected by it. Part IV examines the DMCA's criminal provisions and their potential impact on this area of copyright law. Finally, Part V asserts that while the NET Act technologies, particularly the Internet). 11. See NII WHITE PAPER, supra note 2, at 17. 12. Pub. L. No. 94-553, 90 Stat. 2541 (1976) (codified as amended at 17 U.S.C. §§ 101-1101 (1976)). 13. NI WHITE PAPER, supra note 2, at 212. 14. Pub. L. No. 105-147, 111 Stat. 2678 (codified as amended in scattered sections of 17 U.S.C. and 18 U.S.C.). 15. Pub. L. No. 105-304, 112 Stat. 2860 (codified as amended in scattered sections of 17 U.S.C.). 16. See infra Part V. 186 LOYOLA OFLOS ANGELES LA WREVIEW [Vol. 33:183 necessarily fills a void in the Copyright Act, the DMCA is too vague, overbroad, and potentially more harmful than helpful to the public. Part V also posits several alternatives to the drastic criminal meas- ures prescribed by the DMCA. II. A ROADMAP OF THE INFORMATION SUPERHIGHWAY A. Origin of the Internet The Internet was created in 1969 as an experimental project of the Advanced Research Project Agency, and was originally called ARPANET.17 This was a network18 of computers owned by the military, defense contractors, and university laboratories conducting defense-related research.' 9 Soon, ARPANET expanded beyond its origins in the United States to connect to universities, corporations, and people all around the world. 20 During this process, the Defense Advanced Research Projects Agency ("DARPA") developed rules and procedures, called "protocols," for sending and receiving data between computers on the network. 21 Thus, ARPANET eventually came to be known as "DARPA Internet," and finally just the "Inter- 22 net." As ARPANET grew, similar networks were developed to link universities, research facilities, businesses, and individuals to- gether.23 Eventually, each of these private networks were all linked together, allowing users of any computer linked to one of the net- works to transmit communications to each other.24 This series of linked networks--which are linked computer networks themselves- formed the backbone of the modem day Internet.2 ' The Internet now 17. See ACLU v. Reno, 929 F. Supp. 824, 831 (E.D. Pa. 1996). 18. A "network" is a group of computers linked together in order to ex- change files and messages (and to share equipment such as printers).
Recommended publications
  • Issues Related to the Emergence of the Information Superhighway and California Societal Changes
    IISTPS Report 96-4 Norman Y. Mineta International Institute for Surface Transportation Policy Studies Created by Congress in 1991 ISSUES RELATED TO THE EMERGENCE OF THE INFORMATION SUPERHIGHWAY AND CALIFORNIA SOCIETAL CHANGES Mineta Transportation Institute San Jos é State University San Jose, CA 95192-0219 ISSUES RELATED TO THE EMERGENCE OF THE INFORMATION SUPERHIGHW...Page 1 of 117 IISTPS Report 96-4 ISSUES RELATED TO THE EMERGENCE OF THE INFORMATION SUPERHIGHWAY AND CALIFORNIA SOCIETAL CHANGES December 1996 Dr. Jan L. Botha, Professor of Civil Engineering, Dr. Roger Salstrom, Associate Professor, Organization & Management Dr. R. Benjamin Knapp, Associate Professor of Electrical Engineering Shirley Chan, Research Assistant A publication of the Norman Y. Mineta International Institute for Surface Transportation Policy Studies IISTPS Created by Congress in 1991 Technical Report Documentation Page http://www.transweb.sjsu.edu/publications/Information%20Superhighway.htm 11/6/2003 ISSUES RELATED TO THE EMERGENCE OF THE INFORMATION SUPERHIGHW...Page 2 of 117 1. Report No FHWA/CA/OR-96/23 2. Government Accession No. 3. Recipients Catalog No. 4. Title and Subtitle: 5. Report Date Issues Related to the Emergence of the Information Superhighway and December 1996 California Societial Changes 6. Performing Organization Code 7. Author: 8. Performing Organization Report No. Dr. Jan Botha, Dr. Roger L. Salstrom, Dr. R. Benjamin Knapp, Shirley Chan A94RM63 9. Performing Organization Name and Address: 10. Work Unit No. California Department of Transportation New Technology and Research, MS-83 P.O. Box 942873 Sacramento, Ca. 94273-0001 11. Contract or Grant No. 65VRM63 12. Sponsoring Agency Name and Address: 13. Type of Report and Period Covered: California Department of Transportation Final Report Office of Research- MS4 400 7th Street, SW Sacramento, CA 94273-0001 14.
    [Show full text]
  • ABSTRACT the Emphasis of the Symposium Was the Internet, Or Information Superhighway, and the Provision of Information Services to End Users
    DOCUMENT RESUME ED 381 176 IR 055 472 AUTHOR Helal, Ahmed H., Ed.; Weiss, Joachim W., Ed. TITLE Information Superhighway: The Role of Librarians, Information Scientists, and Intermediaries. Proceedings of the International Essen Symposium (17th, Essen, Germany, October 24-27, 1994). INSTITUTION Essen Univ. (Germany). Library. REPORT NO ISBN-3-922602-19-3; ISSN-0931-7503 PUB DATE 95 NOTE 488p.; Festschrift in honor of Frederick Wilfrid Lancaster. PUB TYPE Collected Works Conference Proceedings (021) EDRS PRICE MF02/PC20 Plus Postage. DESCRIPTORS Academic Libraries: *Access to Information; *Computer Networks: Cooperation; Developing Nations; Electronic Publishing; Foreign Countries; Higher Education; 'Information Networks; Information Technology; 'Librarians; *Library Role; Library Services, Professional Training; Quality Control; Users (information) IDENTIFIERS 'Information Superhighway; *Internet; Virtual Libraries ABSTRACT The emphasis of the symposium was the Internet, or information superhighway, and the provision of information services to end users. Many internationally recognized librarians shared their experiences and expressed their ideas on new developments and possibilities related to the information superhighway. The 34 papers presented at the symposium addressed the following issues:(1) definition, applications, cost, security, privacy, access, delivery, and ease of use;(2) strategies and tactics for accessing information . on the superhighway, as well as concern for unauthorized use; (3) tremendous amounts of irrelevant information,
    [Show full text]
  • The Book of Broken Promises:$400 Billion Broadband Scandal
    THE BOOK OF BROKEN PROMISES: $400 BILLION BROADBAND SCANDAL & FREE THE NET FOR ERIC LEE, AUNT ETHEL, ARNKUSH, AND THE TEAM Author: Bruce Kushnick, Executive Director New Networks Institute February, 2015 Cover Art: Ferrari Wall Paper1, Broken Skateboard by Pr0totyp2 Disclaimer: AT&T, Verizon and CenturyLink are the progeny of the original AT&T. The AT&T logo is the property of AT&T Inc. and the use has not been authorized, sponsored by, or endorsed by the trademark owner. The Verizon logo is the property of Verizon Communications, Inc, and the use has not been authorized, sponsored by, or endorsed by the trademark owner. The CenturyLink logo is the property of CenturyLink, and the use has not been authorized, sponsored by, or endorsed by the trademark owner. All rights reserved. This book has been prepared by New Networks Institute. All rights reserved. Reproduction or further distribution of this report without written authorization is prohibited by law. For additional copies or information please contact [email protected]. © 1997, 2004, 2015 New Networks Institute The Book of Broken Promises 1 What others have said about Bruce Kushnick’s research and previous books: 3 David Cay Johnston, Recipient of the Pulitzer Prize, Author of The Fine Print, 2012 “Kushnick’s estimate comes from his meticulous analysis of disclosure document filed with the Securities and Exchange Commission and other regulatory agencies… Kushnick’s estimate might significantly understate how much extra money people paid for an electronic highway they did not get. It seems very likely that Kushnick’s numbers are uncomfortably close to the truth.” Dr.
    [Show full text]
  • The Candidates
    The Candidates Family Background Bush Gore Career Highlights Bush Gore Personality and Character Bush Gore Political Communication Lab., Stanford University Family Background USA Today June 15, 2000; Page 1A Not in Their Fathers' Images Bush, Gore Apply Lessons Learned From Losses By SUSAN PAGE WASHINGTON -- George W. Bush and Al Gore share a reverence for their famous fathers, one a former president who led the Gulf War, the other a three-term Southern senator who fought for civil rights and against the Vietnam War. The presidential candidates share something else: a determination to avoid missteps that brought both fathers repudiation at the polls in their final elections. The younger Bush's insistence on relying on a trio of longtime and intensely loyal aides -- despite grumbling by GOP insiders that the group is too insular -- reflects his outrage at what he saw as disloyalty during President Bush's re-election campaign in 1992. He complained that high- powered staffers were putting their own agendas first, friends and associates say. Some of those close to the younger Gore trace his willingness to go on the attack to lessons he learned from the above-the-fray stance that his father took in 1970. Then-senator Albert Gore Sr., D-Tenn., refused to dignify what he saw as scurrilous attacks on his character with a response. The approach of Father's Day on Sunday underscores the historic nature of this campaign, as two sons of accomplished politicians face one Political Communication Lab., Stanford University another. Their contest reveals not only the candidates' personalities and priorities but also the influences of watching their famous fathers, both in victory and in defeat.
    [Show full text]
  • The Information Highway
    THE INFORMATION HIGHWAY David L. Bender, Publisher Bruno Leone, Executive Editor Scott Barbour, Managing Editor Brenda Stalcup, Senior Editor Charles P. Cozic, Book Editor Other Books in the Current Controversies Series: The Abortion Controversy The AIDS Crisis Alcoholism Drug Trafficking Energy Alternatives Ethics Europe Family Violence Free Speech Gambling Gun Control Hate Crimes Hunger Illegal Immigration Interventionism Iraq Nationalism and Ethnic Conflict Police Brutality Pollution Reproductive Technologies Sexual Harassment Violence Against Women Violence in the Media Women in the Military Youth Violence No part of this book may be reproduced or used in any form or by any means, electrical, mechanical, or otherwise, including, but not limited to, photocopy, recording, or any information storage and retrieval system, without prior written permission from the publisher. Cover Photo: © Charly Franklin/FPG International Library of Congress Cataloging-in-Publication Data The information highway / Charles P. Cozic, book editor. p. cm. — (Current controversies) Includes bibliographical references and index. ISBN 1-56510-374-2 (pbk. : alk. paper) — ISBN 1-56510-375-0 (lib. bdg. : alk. paper) 1. Information superhighway—United States. 2. Telecommunication policy—United States. 3. Telecommunication—United States. I. Cozic, Charles P., 1957– . II. Series. HE7572.U6I537 1996 384.3—dc20 95-35486 CIPP © 1996 by Greenhaven Press, Inc., PO Box 289009, San Diego, CA 92198-9009 Printed in the U.S.A. Every effort has been made to trace the owners of copyrighted material. Contents Foreword 10 Introduction 12 Chapter 1: What Is the Information Highway? The Information Highway: An Overview by Philip Elmer-DeWitt 16 Cyberspace is the computer-generated landscape where computer communications are conveyed via wires, cables, and microwaves— the foundations of the information highway.
    [Show full text]
  • Protection and Security Information Superhighway
    1992 Protection and Security on the Information Superhighway by Dr. Frederick B. Cohen c , Fred Cohen, 1992 Contents 1 Introduction and Overview 3 1.1 Preview . 6 1.2 The National Information Infrastructure . 10 2 A Growing Dependency 15 2.1 Technology Marches On . 16 2.2 Survival Dependencies . 19 2.3 Personal and Business Dependency . 21 2.4 National Survival Dependencies . 24 2.5 Indirect Dependency . 27 2.6 The Information Superhighway . 28 3 The Disrupters Are Among Us 33 3.1 Computer Accidents . 33 3.2 Intentional Events . 39 3.3 A Classification of Disruptions . 51 3.4 The Disrupters . 53 3.5 Motivation . 66 3.6 The Magnitude and Scope of the Problem . 69 3.7 Adding It All Up . 72 4 Asleep At The Switch 73 i 4.1 A History of Secrecy . 74 4.2 Ignorance Is Not Bliss . 76 4.3 The Birth of the Personal Computer . 77 4.4 A Suppressed Technology . 80 4.5 The Universities Fail Us . 83 4.6 An Industry of Charlatans . 84 4.7 Information Assurance Ignored . 85 4.8 Current Disruption Defenses Depend on People . 92 4.9 The Rest of the World Responds . 95 5 Protecting Your Information Assets 97 5.1 Information Protection . 98 5.2 Infrastructures Are Different Than Other Systems . 100 5.3 A Piecemeal Approach . 102 5.4 An Organizational Perspective . 119 5.5 Some Sample Scenarios . 131 5.6 Strategy and Tactics . 133 5.7 The Cost of Protection . 135 5.8 An Incremental Protection Process . 143 6 Protection Posture Case Studies 147 6.1 How To Do A Protection Posture Assessment .
    [Show full text]
  • 200 Billion Broadband Scandal
    Broadband Scandal 2 $200 Billion Broadband Scandal By Bruce Kushnick Chairman, Teletruth Executive Director, New Networks Institute This book has been prepared by New Networks Institute. All rights reserved. Reproduction or further distribution of this report without written authorization is prohibited by law. For additional copies or information please contact Teletruth in writing at 568 Broadway, Suite 404, New York, NY 10012, or by phone at 718-238- 7191, or by e-mail at [email protected]. © 2006 Teletruth Broadband Scandal 3 Dear Juror, Thanks for purchasing this book. A bit of a roadmap might be useful. This micro-history of the Bells' fiber optic plans is designed to let the reader decide if the case we present is correct. The Bells currently are SBC (renamed AT&T), Verizon, BellSouth and Qwest. It is also designed to serve multiple purposes, such as providing case studies for various states including New Jersey, Massachusetts and California, as well as data to back Teletruth’s Federal Trade Commission (FTC) complaint against SBC and Verizon. The Roadmap NOTE: The book officially starts at Part One, Chapter I. However, we've added other items to the front and the back of the book for the reader. • The Players: Who Are the Bell Companies? — This section is designed to give a thumbnail sketch of the Bell phone companies, the territories they served, as well as their old and new relationships with AT&T and MCI. • How I Came to Write this Book — This is the Preface. • Introduction and Summary — This was designed as the 'Cliff Notes' version of the entire story — Volume I and II.
    [Show full text]
  • Issues for Libraries and Information Science in the Internet Age
    Issues for Libraries and Information Science in the Internet Age Bruce A. Shuman LIBRARIES UNLIMITED, INC. Issues for Libraries and Information Science in the Internet Age This Page Intentionally Left Blank Issues for Libraries and Information Science in the Internet Age Bruce A. Shuman 2001 LIBRARIES UNLIMITED, INC. Englewood, Colorado Come al solito, per mia moglie ed i bambini . Copyright © 2001 Libraries Unlimited, Inc. All Rights Reserved Printed in the United States of America No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. LIBRARIES UNLIMITED, INC. P.O. Box 6633 Englewood, CO 80155-6633 1-800-237-6124 www.lu.com ISBN 1-56308-805-3 Contents Contents Preface . ix 1—Ecce Internet! Capabilities . 1 Overview . 1 What Is the Internet? . 1 Where, Exactly, Is the Internet?. 3 What Is the World Wide Web? . 4 How Big Is the Internet? . 6 How Important Is the Internet? . 10 History: The Internet’s Birth and Development . 17 Demographics: Who’s on the Web? . 22 Capabilities: What You Can Do, Find, Visit on the Web . 26 E-Mail and the Internet . 32 Notes . 35 2—Caveat Internet! Potholes, Hazard Lights, and Glare Ice on the Information Superhighway . 37 Overview. 37 The Times, They Are a-Changin’ . 37 Modern-Day Luddites . 40 Not Dodge City; Who’s in Charge, Here?. 42 Hazardous Driving Conditions on the Infobahn . 46 Drowning in Data: Information Overload . 51 Truth and Accuracy: Information and Misinformation .
    [Show full text]
  • The Good, the Bad, and the Ugly of Telecom Reform: Speech Given at Depaul Law Review Fifth Annual Symposium
    DePaul Law Review Volume 45 Issue 4 Summer 1996: Symposium - Telecommunications Regulation in an Era of Article 4 Convergence The Good, the Bad, and the Ugly of Telecom Reform: Speech Given at DePaul Law Review Fifth Annual Symposium Roy M. Neel Follow this and additional works at: https://via.library.depaul.edu/law-review Recommended Citation Roy M. Neel, The Good, the Bad, and the Ugly of Telecom Reform: Speech Given at DePaul Law Review Fifth Annual Symposium, 45 DePaul L. Rev. 995 (1996) Available at: https://via.library.depaul.edu/law-review/vol45/iss4/4 This Front Matter is brought to you for free and open access by the College of Law at Via Sapientiae. It has been accepted for inclusion in DePaul Law Review by an authorized editor of Via Sapientiae. For more information, please contact [email protected]. THE GOOD, THE BAD, AND THE UGLY OF TELECOM REFORM Roy M. Neel* Every decade or so Congress and the White House, Republicans and Democrats, sit down in Washington, roll up their sleeves, shut out the adversarial rhetoric and the partisan squabbling, and get it right. The amazingly smooth passage of the new telecommunications law on February 8, 1996 was one of those rare occasions.' And, when you peel back all the news hype, it was a genuinely remarkable event in the history of the U.S. economy. As I sat in the audience watching the President sign the bill, I mar- veled that one of the longest-running Washington legislative side- 2 shows, beginning with the so-called "Bell Bill" in 1976, was now over.
    [Show full text]
  • Pres. Bill Clinton Speech)(Transcript) Total Number of Pages for This Article: 5 FULL TEXT
    Monday, September 23, 1996 ISSN: 0511-4187; Volume v32; Issue n38 Remarks in Portland, Oregon. (Pres. Bill Clinton speech)(Transcript) Total number of pages for this article: 5 FULL TEXT September 20, 1996 Thank you. Good morning, Portland. Mayor Katz, Congresswoman Furse, Tom Bruggere, Darlene Hooley, Mike Dugan. Thank you all for being here with us. Madame Mayor and Congresswoman Furse, thank you for making us feel so welcome in Portland again. Maybe I come back here so often because I like it. I must say, I have to hand it to the Vice President. I didn't think anyone could keep a secret in Washington. Al Gore cut a book deal with a book full of secrets. It never leaked. Now he's telling it all, and he wrote the book under his own name. Al Gore is doing for the Federal Government what he did for the macarena. He is removing all the unnecessary steps. [Laughter] Now, he's got some funny names here. He calls for performance-based organizations - that's sort of a boring title. I think we ought to scrap that title and substitute something more exciting, like "Trailblazers." Would you like that? [Applause] I want to thank Tipper Gore and the First Lady, too, for some things they've already talked about. You know, we've worked very hard to improve the health care of the American people. That's a big part of moving into the 21st century, to immunize more children, to increase medical research, to speed the movement of drugs to market.
    [Show full text]
  • The Information Superhighway: Status and Issues
    94-954 SPR The Information Superhighway : Status and Issues Marcia S. Smith Specialist in Science and Technology Policy Science Policy Research Division El Ammik December 2, 1994 -t 11111111111111111111111111111111111111111 THE INFORMATION SUPERHIGHWAY : STATUS AND ISSUES SUMMARY As the media devote increasing attention to the "information super- highway," many question whether this latest high-tech creation is fact, fantasy, or a distant future . The answer is one of perspective and expectations. For those who think of the Information Superhighway ("I-way") in terms of computers around the country and the world connected to each other, forming large networks that allow instant access to vast amounts of information and people, a prototype system already exists, the Internet . To those with a more expansive vision, Internet is at best a two-lane road, and the Superhighway still in its earliest stages of construction . Vice President Gore's vision, called the National Information Infrastructure (NII), would provide "a seamless web of communications networks, computers, databases, and consumer electronics that will put vast amounts of information at users' fingertips ." The Vice President's frequent references to enabling every school in America to access the collections of the Library of Congress has become symbolic of the ultimate capability of the Superhighway, but such access will require billions of dollars of investment in technology, hardware, software, training, and "digitizing" the vast amounts of text, audio, and video material currently in other forms . Clearly that vision is far from realization, even though the private sector is already making substantial investments . The Vice President also wants the NII expanded to the world, calling it the Global Information Infrastructure (GII) .
    [Show full text]
  • Issues for Libraries and Information Science in the Internet Age
    Issues for Libraries and Information Science in the Internet Age Bruce A. Shuman LIBRARIES UNLIMITED, INC. Issues for Libraries and Information Science in the Internet Age This Page Intentionally Left Blank Issues for Libraries and Information Science in the Internet Age Bruce A. Shuman 2001 LIBRARIES UNLIMITED, INC. Englewood, Colorado Come al solito, per mia moglie ed i bambini . Copyright © 2001 Libraries Unlimited, Inc. All Rights Reserved Printed in the United States of America No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. LIBRARIES UNLIMITED, INC. P.O. Box 6633 Englewood, CO 80155-6633 1-800-237-6124 www.lu.com ISBN 1-56308-805-3 Contents Contents Preface . ix 1—Ecce Internet! Capabilities . 1 Overview . 1 What Is the Internet? . 1 Where, Exactly, Is the Internet?. 3 What Is the World Wide Web? . 4 How Big Is the Internet? . 6 How Important Is the Internet? . 10 History: The Internet’s Birth and Development . 17 Demographics: Who’s on the Web? . 22 Capabilities: What You Can Do, Find, Visit on the Web . 26 E-Mail and the Internet . 32 Notes . 35 2—Caveat Internet! Potholes, Hazard Lights, and Glare Ice on the Information Superhighway . 37 Overview. 37 The Times, They Are a-Changin’ . 37 Modern-Day Luddites . 40 Not Dodge City; Who’s in Charge, Here?. 42 Hazardous Driving Conditions on the Infobahn . 46 Drowning in Data: Information Overload . 51 Truth and Accuracy: Information and Misinformation .
    [Show full text]